Show a cover letter.

GET /api/covers/2217290/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2217290,
    "url": "http://patchwork.ozlabs.org/api/covers/2217290/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/cover/20260327205457.604224-1-surenb@google.com/",
    "project": {
        "id": 2,
        "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api",
        "name": "Linux PPC development",
        "link_name": "linuxppc-dev",
        "list_id": "linuxppc-dev.lists.ozlabs.org",
        "list_email": "linuxppc-dev@lists.ozlabs.org",
        "web_url": "https://github.com/linuxppc/wiki/wiki",
        "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git",
        "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/",
        "list_archive_url": "https://lore.kernel.org/linuxppc-dev/",
        "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/",
        "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}"
    },
    "msgid": "<20260327205457.604224-1-surenb@google.com>",
    "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260327205457.604224-1-surenb@google.com/",
    "date": "2026-03-27T20:54:51",
    "name": "[v6,0/6] Use killable vma write locking in most places",
    "submitter": {
        "id": 74729,
        "url": "http://patchwork.ozlabs.org/api/people/74729/?format=api",
        "name": "Suren Baghdasaryan",
        "email": "surenb@google.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/cover/20260327205457.604224-1-surenb@google.com/mbox/",
    "series": [
        {
            "id": 497828,
            "url": "http://patchwork.ozlabs.org/api/series/497828/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=497828",
            "date": "2026-03-27T20:54:51",
            "name": "Use killable vma write locking in most places",
            "version": 6,
            "mbox": "http://patchwork.ozlabs.org/series/497828/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2217290/comments/",
    "headers": {
        "Return-Path": "\n <linuxppc-dev+bounces-18938-incoming=patchwork.ozlabs.org@lists.ozlabs.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linuxppc-dev@lists.ozlabs.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256\n header.s=20251104 header.b=dTU8G2gY;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-18938-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)",
            "lists.ozlabs.org;\n arc=none smtp.remote-ip=\"2607:f8b0:4864:20::1349\"",
            "lists.ozlabs.org;\n dmarc=pass (p=reject dis=none) header.from=google.com",
            "lists.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256\n header.s=20251104 header.b=dTU8G2gY;\n\tdkim-atps=neutral",
            "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=flex--surenb.bounces.google.com\n (client-ip=2607:f8b0:4864:20::1349; helo=mail-dy1-x1349.google.com;\n envelope-from=3pe7gaqykdpimolyhvaiiafy.wigfchorjjw-xypfcmnm.itfuvm.ila@flex--surenb.bounces.google.com;\n receiver=lists.ozlabs.org)"
        ],
        "Received": [
            "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fjCZq0tKkz1y1x\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 28 Mar 2026 07:55:14 +1100 (AEDT)",
            "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4fjCZg6nD8z2ygY;\n\tSat, 28 Mar 2026 07:55:07 +1100 (AEDT)",
            "from mail-dy1-x1349.google.com (mail-dy1-x1349.google.com\n [IPv6:2607:f8b0:4864:20::1349])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4fjCZf1khWz2yS4\n\tfor <linuxppc-dev@lists.ozlabs.org>; Sat, 28 Mar 2026 07:55:05 +1100 (AEDT)",
            "by mail-dy1-x1349.google.com with SMTP id\n 5a478bee46e88-2bdc1b30ac8so5482224eec.1\n        for <linuxppc-dev@lists.ozlabs.org>;\n Fri, 27 Mar 2026 13:55:05 -0700 (PDT)"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1774644907;\n\tcv=none;\n b=ZtHEle1UVVU7HF/6THAKVvdCcQlAxLX2sYMveGy8xSif5rYWzqI+88jkIKs9oRCdVq3XVLEUfdEKc8G79cYClQi4Vqkga7aXBq/cvHFgnCpYG2e6TYeOqWPGRp9MYM8GHSjKKkNQ6tBBurMaXWTkThFtR9m8o/cPhx6h43yeYI4dq61j/DKFhTYReNaqAfo76LpAQyOsnxanK30UgRC5ACsLFlFFBeA1WOIbbgpLZLrmmssQgZvtSOBvxCxslCLbSpyRVsZyBhWrwMf6VrdNEvmavS64YJ1TIOwOGDwU/PZqyb6O6OFdT71N9zDPc/l9bGwz2oHkrWFI5dman0+hbA==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1774644907; c=relaxed/relaxed;\n\tbh=xdmn94fDq5EabxgUHdZFE1PchWB5l0Hn00gGljt6mxc=;\n\th=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type;\n b=PVWIr7Xwetd/5sGMUrf3RXH+T0tkVGInEfue3JRFMQAf0A2Xb+Czn9XecckT2YU8nsIFirZyouckzA3i0zanb4BBnMLIkZvGcIkKqr0UPabyZBudeV9JaPJsGFraoG79uvkWFSCKstNOZipIktrGtGsCddxXDVLSIxA4faPCm+kmJ5RAEwvU6oEX1HhXDq0rY0OWZHZamDIvajpPibg7TJdKxGT1kF4e454muk+qjpgnzeova9Z5IsjhV2USOpDFrmyCmHguT6T7ChhXMHQaJD4ZAPIb+BQoiXvflWDSlKJm/lyQ4HBEDPL3TrDkVv0PG96HxyzpHQzhUkWbVeYZmw==",
        "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=reject dis=none) header.from=google.com;\n dkim=pass (2048-bit key;\n unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256\n header.s=20251104 header.b=dTU8G2gY; dkim-atps=neutral;\n spf=pass (client-ip=2607:f8b0:4864:20::1349; helo=mail-dy1-x1349.google.com;\n envelope-from=3pe7gaqykdpimolyhvaiiafy.wigfchorjjw-xypfcmnm.itfuvm.ila@flex--surenb.bounces.google.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=flex--surenb.bounces.google.com",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=google.com; s=20251104; t=1774644902; x=1775249702;\n darn=lists.ozlabs.org;\n        h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject\n         :date:message-id:reply-to;\n        bh=xdmn94fDq5EabxgUHdZFE1PchWB5l0Hn00gGljt6mxc=;\n        b=dTU8G2gY52FtCftFmFe5BpvvGbR9s7EyDqbvlWS5P4+E3Gc4w0k3lJ98LCzKU/B2qj\n         StiXrFy5MJOPcmQW6pZqRQw14m3WQ/P3TzIRr7TMOngy78wShy1AyeperzU5UtmhCBDu\n         nKbw9ZRmphd4JdXNB+8G6FBNtkzrii4lOpgxRdniWKAtAQKvypV7Ih8rWZDh2zvIFAL2\n         O9lYEF7GbuOd0b3hCw5fEs59T1JGrRPZJ2wsJgzK2yll/F5aN4WpYhayLKCPKh/mT/al\n         mTdfxJWa3B0olZpOukH7sg2ukg/8LMf511iKnJAVucOjc1R4s6RrYehagcrDV9YJIpxU\n         brbA==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1774644902; x=1775249702;\n        h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state\n         :from:to:cc:subject:date:message-id:reply-to;\n        bh=xdmn94fDq5EabxgUHdZFE1PchWB5l0Hn00gGljt6mxc=;\n        b=odjbIB/Zv6NAYyAeewPCR0pS2RU4jybsYD0DDPT883kllJDJyy8hCeT4RR9JmiS3oi\n         +myS6BXBqKWLLota66ZNQIj3wuk0qoPu0f+WBYgWZ+5Cw5QNZTV81G+L3a23dno5sMus\n         3Pjogiad4xeUQ/PjhPmjAf7hTuLLI+DYadMSRXLU21lewUcciDoCmE2x9VKX+BQnJZTK\n         i6P38m3SjG1e/06Jc4hBZJsKdzH7lS5zbPj50VC1Jy8auuDGs8PmmWuQJtIV9CVbeQAY\n         r1s9ivXWT9FaM4VqdWlb6IUKDuU75a8HStZAlKKra5zlR8dgyYxVHlRiFlXAzZTNFeSU\n         KMMg==",
        "X-Forwarded-Encrypted": "i=1;\n AJvYcCVpRUfzNglTJfcG4tgBHvSczkwYZwbqTAZqosDS5muN8oLTNwfbjZQ+G0MibPJ0hrK9nNSkn7xObOdO5sc=@lists.ozlabs.org",
        "X-Gm-Message-State": "AOJu0Yzz4JKyg8NvzHI07cB0FfIP5cwJ9HtKMVr8bV49yJPm2zs1GrsO\n\tyHOzFUSr26ljfuS6NuybJPQRk1MXyVBq2SFg83q0oGOC7NtoeSmQD0fadPLXkg4pAAQXTxc+qxR\n\tA8inzuQ==",
        "X-Received": "from dybse8.prod.google.com\n ([2002:a05:7301:4908:b0:2be:77bc:5c34])\n (user=surenb job=prod-delivery.src-stubby-dispatcher) by\n 2002:a05:693c:3113:b0:2c0:cff4:b456\n with SMTP id 5a478bee46e88-2c185e5a4e2mr2359718eec.29.1774644901334; Fri, 27\n Mar 2026 13:55:01 -0700 (PDT)",
        "Date": "Fri, 27 Mar 2026 13:54:51 -0700",
        "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org",
        "List-Id": "<linuxppc-dev.lists.ozlabs.org>",
        "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>",
        "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>",
        "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>",
        "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>",
        "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>",
        "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>",
        "Precedence": "list",
        "Mime-Version": "1.0",
        "X-Mailer": "git-send-email 2.53.0.1018.g2bb0e51243-goog",
        "Message-ID": "<20260327205457.604224-1-surenb@google.com>",
        "Subject": "[PATCH v6 0/6] Use killable vma write locking in most places",
        "From": "Suren Baghdasaryan <surenb@google.com>",
        "To": "akpm@linux-foundation.org",
        "Cc": "willy@infradead.org, david@kernel.org, ziy@nvidia.com,\n\tmatthew.brost@intel.com, joshua.hahnjy@gmail.com, rakie.kim@sk.com,\n\tbyungchul@sk.com, gourry@gourry.net, ying.huang@linux.alibaba.com,\n\tapopple@nvidia.com, ljs@kernel.org, baolin.wang@linux.alibaba.com,\n\tLiam.Howlett@oracle.com, npache@redhat.com, ryan.roberts@arm.com,\n\tdev.jain@arm.com, baohua@kernel.org, lance.yang@linux.dev, vbabka@suse.cz,\n\tjannh@google.com, rppt@kernel.org, mhocko@suse.com, pfalcato@suse.de,\n\tkees@kernel.org, maddy@linux.ibm.com, npiggin@gmail.com, mpe@ellerman.id.au,\n\tchleroy@kernel.org, borntraeger@linux.ibm.com, frankja@linux.ibm.com,\n\timbrenda@linux.ibm.com, hca@linux.ibm.com, gor@linux.ibm.com,\n\tagordeev@linux.ibm.com, svens@linux.ibm.com, gerald.schaefer@linux.ibm.com,\n\tlinux-mm@kvack.org, linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, surenb@google.com",
        "Content-Type": "text/plain; charset=\"UTF-8\"",
        "X-Spam-Status": "No, score=-7.6 required=3.0 tests=DKIMWL_WL_MED,DKIM_SIGNED,\n\tDKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,\n\tUSER_IN_DEF_DKIM_WL autolearn=disabled version=4.0.1 OzLabs 8",
        "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org"
    },
    "content": "Now that we have vma_start_write_killable() we can replace most of the\nvma_start_write() calls with it, improving reaction time to the kill\nsignal.\n\nThere are several places which are left untouched by this patchset:\n\n1. free_pgtables() because function should free page tables even if a\nfatal signal is pending.\n\n2. userfaultd code, where some paths calling vma_start_write() can\nhandle EINTR and some can't without a deeper code refactoring.\n\n3. mpol_rebind_mm() which is used by cpusset controller for migrations\nand operates on a remote mm. Incomplete operations here would result\nin an inconsistent cgroup state.\n\n4. vm_flags_{set|mod|clear} require refactoring that involves moving\nvma_start_write() out of these functions and replacing it with\nvma_assert_write_locked(), then callers of these functions should\nlock the vma themselves using vma_start_write_killable() whenever\npossible.\n\nChanges since v5 [1]:\n- Added Reviewed-by for unchanged patches, per Lorenzo Stoakes\n\nPatch#2:\n- Fixed locked_vm counter if mlock_vma_pages_range() fails in\nmlock_fixup(), per Sashiko\n- Avoid VMA re-locking in madvise_update_vma(), mprotect_fixup() and\nmseal_apply() when vma_modify_XXX creates a new VMA as it will already be\nlocked. This prevents the possibility of incomplete operation if signal\nhappens after a successful vma_modify_XXX modified the vma tree,\nper Sashiko\n- Removed obsolete comment in madvise_update_vma() and mprotect_fixup()\n\nPatch#4:\n- Added clarifying comment for vma_start_write_killable() when locking a\ndetached VMA\n- Override VMA_MERGE_NOMERGE in vma_expand() to prevent callers from\nfalling back to a new VMA allocation, per Sashiko\n- Added a note in the changelog about temporary workaround of using\nENOMEM to propagate the error in vma_merge_existing_range() and\nvma_expand()\n\nPatch#5:\n- Added fatal_signal_pending() check in do_mbind() to detect\nqueue_pages_range() failures due to a pendig fatal signal, per Sashiko\n\n[1] https://lore.kernel.org/all/20260326080836.695207-1-surenb@google.com/\n\nSuren Baghdasaryan (6):\n  mm/vma: cleanup error handling path in vma_expand()\n  mm: use vma_start_write_killable() in mm syscalls\n  mm/khugepaged: use vma_start_write_killable() in collapse_huge_page()\n  mm/vma: use vma_start_write_killable() in vma operations\n  mm: use vma_start_write_killable() in process_vma_walk_lock()\n  KVM: PPC: use vma_start_write_killable() in\n    kvmppc_memslot_page_merge()\n\n arch/powerpc/kvm/book3s_hv_uvmem.c |   5 +-\n fs/proc/task_mmu.c                 |  12 +--\n mm/khugepaged.c                    |   5 +-\n mm/madvise.c                       |  13 ++-\n mm/memory.c                        |   2 +\n mm/mempolicy.c                     |  21 +++-\n mm/mlock.c                         |  30 ++++--\n mm/mprotect.c                      |  25 +++--\n mm/mremap.c                        |   8 +-\n mm/mseal.c                         |  24 ++++-\n mm/pagewalk.c                      |  22 ++--\n mm/vma.c                           | 162 ++++++++++++++++++++++-------\n mm/vma_exec.c                      |   6 +-\n 13 files changed, 251 insertions(+), 84 deletions(-)\n\n\nbase-commit: e53c9040ab1b738dd2c83b57558f141902caaf4f"
}